The Ultimate Guide to Advanced Persistent Threat Protection
2024 edition
Overview
Most associated with industrial or political espionage (between opposing nations) Advanced Persistent Threats are characterized by stealth, persistence (the bad actor doesn’t let up), and a high degree of sophistication. A famous example is the Stuxnet attack targeting the Iranian nuclear program. Advanced Persistent Threat Protection is the specialised cybersecurity branch seeking to identify, prevent or mitigate these types of attack.
Analyst reports
ABI Research on Firewall
Cyber threats prompt UK industries to prioritise cybers...
Last month
IDC MarketScape on Ransomware
Canadian ISA Cybersecurity launches first UK operation ...
Last month
IDC MarketScape on Firewall
Sophos leads in IDC MarketScape's cybersecurity assessm...
Last month
IDC on Firewall
Ransomware peaks as top threat in ANZ as study highligh...
Last month
Miercom on Cybersecurity
Check Point's Infinity Platform crowned leading Zero Tr...
Last month
Featured news
About Collaboration
Titans of Tech - Mike East of Cado Security
This month
About Cloud Services
Exclusive: How Okta is fortifying digital identities
Last month
About Cyber Threats
Exclusive: Aura sheds insights on the state of cybersec...
Last month
About Cloud Services
Exclusive: Why Commvault's focused on cyber resilience
Last month
Expert columns
By Nathan Wenzler of Tenable
Customers vs banks - Where should the buck stop in prev...
Last week
By Adam Khan of Barracuda XDR
How attackers target security blind spots: Three real-l...
This month
By Mark Gorrie of Gen Digital Inc
Watch out! There are hidden dangers lurking in your PDF...
This month
By Mark Gorrie of Gen Digital Inc
One wrong click can devastate your small business: so w...
This month
By Richard Sorosina of Qualys
Software supply chain security: Finding the weakest lin...
This month
More expert columns
By Brett Chase of Cohesity
The imperative to go beyond backup, by focusing on cybe...
Last month
By George Moawad of Genetec
Cybersecurity risks of legacy access control systems
Last month
By Robin Long & Raj Samani of Rapid7
Why the external attack surface matters: An analysis in...
Last month
By Ilan Rubin of Wavelink
The role of change management in cybersecurity awarenes...
Last month
By Crystal Morin of Sysdig
Cloud-native security: Best practices vs. convenience a...
Last month
By George Moawad of Genetec
Ensuring security without compromising privacy
Last month
Top players
Recent news
About Cyber Threats
Smarttech247 & SentinelOne launch AI-powered cybersecur...
Last week
About Ransomware
High Performance Podcast duo to keynote Infosecurity Eu...
Last week
About Collaboration
HP introduces AI-powered personal computers in Australi...
Last week
About Insider threats
AI tools linked to data exposure in 1 in 5 UK organisat...
Last week
About Outsourcing
IT leaders leaning on outsourcing for DMARC implementat...
Last week
More expert columns
By George Moawad of Genetec
Ensuring security without compromising privacy
Last month
By Wayne Phillips of SentinelOne
From investment to impact: Unlocking cybersecurity valu...
Last month
By George Moawad of Genetec
A proactive approach to cyber and physical security
Last month
By Matt Caffrey of Barracuda Australia
Five ways AI is already strengthening cyber-defences
Last month
By Jessie Jamieson of Tenable
IWD 2024: Moving past quotas: Inclusivity & neurodivers...
Last month
By Leanne Salisbury of Adarma
IWD 2024: Forging the path – The inspirational stories ...
Last month
Video interviews
Discussing Threat detection
Video: 10 minute IT Jams - An update from Check Point S...
Fri, 18th Aug 2023
Discussing Cyber Criminal
Video: 10 Minute IT Jams - Another update from Mandiant
Fri, 18th Aug 2023
Discussing Management
Video: 10 Minute IT Jam - An update from Trustwave
Wed, 16th Aug 2023
Discussing Forensics
Video: 10 Minute IT Jams - An update from Cado Security
Thu, 13th Jul 2023
Even more expert columns
By Leanne Salisbury of Adarma
IWD 2024: Forging the path – The inspirational stories ...
Last month
By Nathan Wenzler of Tenable
Decoding the Microsoft breach: Key lessons to bolster c...
Last month
By Matias Madou of Secure Code Warrior
The importance of cybersecurity training for software d...
Wed, 28th Feb 2024
By Stephen Bovis of Oracle ANZ
Innovation, AI and Australia and New Zealand’s digital ...
Tue, 13th Feb 2024
By Matt Caffrey of Barracuda Australia
Advanced security tools can help bridge the cyber-skill...
Mon, 5th Feb 2024
By Scott McKinnel of Tenable ANZ
Exposure management: a strategic ally in essential eigh...
Mon, 5th Feb 2024
By Marius Van Der Merwe of i-PRO
The transformational power of AI in security
Wed, 17th Jan 2024
By Ash Shatrieh of F-Secure
Small businesses targeted by cyber criminals for data
Thu, 21st Dec 2023
By Dr. Jessie Jamieson of Tenable
Australia's six cyber shields: Will data science be sev...
Mon, 4th Dec 2023
By Nicko van Someren of Absolute Software
The pressing need for self-healing apps and network res...
Thu, 30th Nov 2023
More news
About IT Training
Acumen expands partnerships to bolster cyber security s...
Last week
About Mergers and Acquisitions
KnowBe4 to acquire Egress for enhanced AI-driven cybers...
Last week
About Ransomware
Mandiant unveils latest M-Trends 2024 cybersecurity rep...
Last week
About Security Information and Event Management
Australian organisations face surge in ransomware attac...
Last week
About Intellectual property
Ransomware attacks rise in global food & agriculture se...
Last week
Even more news
About Data Protection
SentinelOne implements AI security tech at Australian i...
Last week
About Cloud Services
BeyondTrust's 2024 report reveals top Microsoft vulnera...
Last week
About Machine learning
AI-enabled biometric market to reach $50.5 billion by 2...
Last week
About Data Protection
Tuttnauer partners with Check Point to boost healthcare...
Last week
About Leadership
UK IT leaders doubt government's ability to prevent cyb...
Last week
Job moves
Move at Vectra AI
Former Google Cloud VP Jeff Reed joins Vectra AI as Chi...
Last week
Move at Zscaler
Zscaler boosts ANZ presence with high-profile leadershi...
This month
Move at Application Security
Major coup for Mindgard with new VP from cybersecurity ...
Last month
Move at Citadel
Earnix welcomes Daniel Shalom as new Chief Information ...
Fri, 23rd Feb 2024
Move at McAfee
BeyondTrust strengthens Asia Pacific expansion with key...
Thu, 15th Feb 2024
Other guides
You can read other related guides from Cybersecurity, Artificial Intelligence, Breach Prevention, AI Security, and Partner Programmes.
Powered by